Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks

The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in orde...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced research in computer science 2012-07, Vol.3 (4)
Hauptverfasser: Onwudebelu, Ugochukwu, Akpojaro, Jackson
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 4
container_start_page
container_title International journal of advanced research in computer science
container_volume 3
creator Onwudebelu, Ugochukwu
Akpojaro, Jackson
description The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_1443735834</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3105354501</sourcerecordid><originalsourceid>FETCH-proquest_journals_14437358343</originalsourceid><addsrcrecordid>eNqNjLEKwjAURYMgWLT_8MC5UEnaGjeRioKDUCeXUkJaUmui76WDf28EB0fvcodzOBMWpbLIkyyXxYzFRH0axqXMRRqxazlo5dFZo6DSakTjX3AkGjVt4IzOB2psB25E-FFPptXQortD5ZRpBihtZ6zW-HG33jfqRgs2bZuBdPz9OVvuy8vukDzQPUPf132o2oDqlRC84NmaC_6f9QZbs0Lk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1443735834</pqid></control><display><type>article</type><title>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Onwudebelu, Ugochukwu ; Akpojaro, Jackson</creator><creatorcontrib>Onwudebelu, Ugochukwu ; Akpojaro, Jackson</creatorcontrib><description>The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information.</description><identifier>EISSN: 0976-5697</identifier><language>eng</language><publisher>Udaipur: International Journal of Advanced Research in Computer Science</publisher><subject>Computer science ; Cybercrime ; Engineering ; Engineers ; Hackers ; Identity theft ; Network security ; Security systems</subject><ispartof>International journal of advanced research in computer science, 2012-07, Vol.3 (4)</ispartof><rights>Copyright International Journal of Advanced Research in Computer Science Jul 2012</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Onwudebelu, Ugochukwu</creatorcontrib><creatorcontrib>Akpojaro, Jackson</creatorcontrib><title>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</title><title>International journal of advanced research in computer science</title><description>The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information.</description><subject>Computer science</subject><subject>Cybercrime</subject><subject>Engineering</subject><subject>Engineers</subject><subject>Hackers</subject><subject>Identity theft</subject><subject>Network security</subject><subject>Security systems</subject><issn>0976-5697</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqNjLEKwjAURYMgWLT_8MC5UEnaGjeRioKDUCeXUkJaUmui76WDf28EB0fvcodzOBMWpbLIkyyXxYzFRH0axqXMRRqxazlo5dFZo6DSakTjX3AkGjVt4IzOB2psB25E-FFPptXQortD5ZRpBihtZ6zW-HG33jfqRgs2bZuBdPz9OVvuy8vukDzQPUPf132o2oDqlRC84NmaC_6f9QZbs0Lk</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Onwudebelu, Ugochukwu</creator><creator>Akpojaro, Jackson</creator><general>International Journal of Advanced Research in Computer Science</general><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20120701</creationdate><title>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</title><author>Onwudebelu, Ugochukwu ; Akpojaro, Jackson</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_14437358343</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Computer science</topic><topic>Cybercrime</topic><topic>Engineering</topic><topic>Engineers</topic><topic>Hackers</topic><topic>Identity theft</topic><topic>Network security</topic><topic>Security systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Onwudebelu, Ugochukwu</creatorcontrib><creatorcontrib>Akpojaro, Jackson</creatorcontrib><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced research in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Onwudebelu, Ugochukwu</au><au>Akpojaro, Jackson</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks</atitle><jtitle>International journal of advanced research in computer science</jtitle><date>2012-07-01</date><risdate>2012</risdate><volume>3</volume><issue>4</issue><eissn>0976-5697</eissn><abstract>The essential need for security is apparent to organizations, government and individuals. Whether it is to secure a company's assets, abide by a law, or guard an individual's privacy, it has become evident that all are vulnerable to one form of electronic attack or another and that in order to protect sensitive information, all possible security precautions must be taken to limit any form of authorized access to electronic records or computer-related equipment. In this security-conscious era, we spend huge sums on technology to protect our computer networks and data. As IT security spending has increased so also has the number of successful attacks. This paper has been developed to highlight the fact that we all have an 'electronic life' which is been hunted by social engineers, and provides a solution on how this life can be protected. The purpose is to provide organizations and individual a simple solution for increasing security awareness against social engineering attacks towards their critical information.</abstract><cop>Udaipur</cop><pub>International Journal of Advanced Research in Computer Science</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 0976-5697
ispartof International journal of advanced research in computer science, 2012-07, Vol.3 (4)
issn 0976-5697
language eng
recordid cdi_proquest_journals_1443735834
source EZB-FREE-00999 freely available EZB journals
subjects Computer science
Cybercrime
Engineering
Engineers
Hackers
Identity theft
Network security
Security systems
title Electronic Security Issues: Protecting our Electronic Life from Social Engineering Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T03%3A29%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Electronic%20Security%20Issues:%20Protecting%20our%20Electronic%20Life%20from%20Social%20Engineering%20Attacks&rft.jtitle=International%20journal%20of%20advanced%20research%20in%20computer%20science&rft.au=Onwudebelu,%20Ugochukwu&rft.date=2012-07-01&rft.volume=3&rft.issue=4&rft.eissn=0976-5697&rft_id=info:doi/&rft_dat=%3Cproquest%3E3105354501%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1443735834&rft_id=info:pmid/&rfr_iscdi=true